“This session is ideal for anyone who needs to demonstrate effective cyber risk management through reporting and alignment with recognized frameworks like NIST and ISO 27001. You'll walk away with actionable insights to ensure your organization stays protected in today’s ever-evolving cyber threat environment.”
– Mike Franklin, Protecht Group
Key topics
- Understanding controls in cyber and IT risk: What are they, and why are they essential?
- Pain points in cyber risk management: Balancing the pressure to manage cyber risks effectively while aligning with accepted frameworks, and the resource-heavy process of mapping controls
- Ongoing controls assurance: How to gain confidence that you're meeting your cyber obligations
- The evolving threat landscape: How do you know what you may have missed?
- ISMS and ERM alignment: Ensuring your Information Security Management System integrates with Enterprise Risk Management processes
- Fixing gaps and shifting your thinking: Moving beyond compliance to ensure true security
Who should attend?
- Chief Information Officers (CIOs), Chief Technology Officers (CTOs), and Chief Information Security Officers (CISOs)
- IT managers and IT risk managers
- Cyber security professionals
- Chief Risk Officers (CROs)
- Risk managers
- Executives responsible for risk and governance
Learn more about Protecht's IT risk management capabilities
- Safter, smarter information security with Protecht ERM
- Cyber risk management: The art of prevention, detection and correction (eBook)
- Information technology risk management: How it's different than cyber risk and not just a concern for the IT department (eBook)
- Enterprise risk management best practices: How to manage risk effectively across the enterprise (eBook)